C H A P T E R  8

Security Guidelines

This chapter provides important information about securing the system, explains security recommendations, discusses domain minimization, and provides references to Solaris Operating System security.

This chapter includes the following topics:


Securing the System

The following are security practices to consider:

The practice of configuring a system to limit unauthorized access is called hardening. There are several configuration steps that can contribute to hardening your system. These steps are guidelines for system configuration:

Defining the Console Password

The only restrictions on SC console passwords are the character set supported by ASCII and the terminal emulator in use. The SC uses the MD5 algorithm to generate a hash of the password entered. Correspondingly, all characters entered are significant.

A minimum password length of 16 characters promotes the use of pass-phrases instead of passwords. Passwords should be composed of a mixture of lowercase, uppercase, numeric, and punctuation characters. For information on how to set the console password, see To Set Up the Password.

Using the SNMP Protocol Default Configuration

Simple Network Management Protocol (SNMP) is commonly used to monitor and manage networked devices and systems. By default, SNMP is disabled.



Note - The use of Sun Management Center software requires SNMP. However, since the SC does not support a secure version of the SNMP protocol, do not enable SNMP unless you must use Sun Management Center software.




procedure icon  To Reboot the SC to Implement Settings

The SC needs to be rebooted if a console message similar to the following is displayed:


Rebooting the SC is required for changes in network settings to take effect. 

single-step bulletType resetsc -y to reboot the SC

The SC can be rebooted while the Solaris domain is up and running.

After rebooting the SC, use the shownetwork command to validate that all the network modifications were implemented.

For information about using the Sun Security Toolkit to create secure configurations for systems running the Solaris Operating System, see the following web site:

http://www.sun.com/security/jass
Table that describes the security-related parameters and configuration settings.


Selecting a Remote Connection Type

The SSH and Telnet services on the SC are disabled by default.

Enabling SSH

If the SC is on a general purpose network, you can ensure secure remote access to the SC by using SSH rather than Telnet. SSH encrypts data flowing between host and client. It provides authentication mechanisms that identify both hosts and users, enabling secure connections between known systems. Telnet is fundamentally insecure because the Telnet protocol transmits information (including passwords) unencrypted.



Note - SSH does not help with FTP, HTTP, SYSLOG, or SNMPv1 protocols. These protocols are insecure and should be used cautiously on general purpose networks.



The SC provides limited SSH functionality, supporting only SSH version 2 (SSHv2) client requests. TABLE 8-1 identifies the various SSH server attributes and describes how the attributes are handled in this subset. These attribute settings are not configurable.


TABLE 8-1 SSH Server Attributes

Attribute

Value

Comment

Protocol

2

SSH v2 support only

Port

22

Listening port

ListenAddress

0.0.0.0

Support multiple IP addresses

AllowTcpForwarding

no

Port forwarding not supported

RSAAuthentication

no

Public key authentication disabled

PubkeyAuthentication

no

Public key authentication disabled

PermitEmptyPasswords

yes

Password authentication controlled by the SC

MACs

hmac-sha1,hmac-md5

Same SSH server implementation as the Solaris 9 Operating System

Ciphers

aes128-cbc,blowfish-cbc,3des-cbc

Same SSH server implementation as the Solaris 9 Operating System



procedure icon  To Enable SSH

1. To enable SSH, type:


lom> setupnetwork

You are prompted to enter the network configuration and connection parameters. For example:


lom> setupnetwork
 
Network Configuration
---------------------
Is the system controller on a network? [yes]: 
Use DHCP or static network settings? [static]: 
Hostname [hostname]: 
IP Address [xxx.xxx.xxx.xxx]: 
Netmask [xxx.xxx.xxx.x]: 
Gateway [xxx.xxx.xxx.xxx]: 
DNS Domain [xxxx.xxx.xxx]: 
Primary DNS Server [xxx.xxx.xxx.xx]: 
Secondary DNS Server [xxx.xxx.xx.x]: 
Connection type (ssh, telnet, none) [ssh]: 
 
Rebooting the SC is required for changes in the above network settings to take effect. 
lom>

For detailed information on the setupnetwork command, see the command description in the Sun Fire Entry-Level Midrange System Controller Command Reference Manual.

Features Not Supported by SSH

The SSH server on Sun Fire entry-level midrange systems does not support the following features:

If you try to use any of the above features, an error message is generated. For example, if you type the following command


# ssh SCHOST showboards

The following messages are generated:

Changing SSH Host Keys

It is good security practice for well-managed machines to get new host keys periodically. If you suspect that the host key might be compromised, you can use the ssh-keygen command to regenerate system host keys.

Host keys, once generated, can only be replaced and not deleted without resorting to the setdefaults command. For newly generated host keys to be activated, the SSH server must be restarted either by running the restartssh command or through a reboot. For further information on the ssh-keygen and restartssh commands (with examples), see the Sun Fire Entry-Level Midrange System Controller Command Reference Manual.



Note - You can also use the ssh-keygen command to display the host key fingerprint on the SC.




Additional Security Considerations

This section discusses the following topics:

Special Key Sequences Allow RTOS Shell Access

Special key sequences can be issued to the SC, over its serial connection, while it is booting. These key sequences have special capabilities if entered at the serial port within the first 30 seconds after an SC reboot.

The special capabilities of these key sequences are automatically disabled 30 seconds after the Sun copyright message is displayed. Once the capability is disabled, the key sequences operate as normal control keys.

Because of the risk that the security of the SC could be compromised by unauthorized access to the RTOS shell, you should control access to the serial ports of the SC.

Domain Minimization

One way to contribute to the security of a Sun Fire midrange system is to tailor the installation of software to an essential minimum. By limiting the number of software components installed on each domain (called domain minimization), you can reduce the risks of security holes that can be exploited by potential intruders.

For a detailed discussion of minimization, with examples, see Minimizing Domains for Sun Fire V1280, 6800, 12K, and 15K Systems (two-part article) available online at:

http://www.sun.com/security/blueprints

Solaris Operating System Security

For information on securing the Solaris Operating System, see the following books and articles:

http://www.sun.com/security/blueprints

http://www.sun.com/security/jass